Sciweavers

2940 search results - page 434 / 588
» Behavioral Constraints for Services
Sort
View
IANDC
2008
128views more  IANDC 2008»
13 years 9 months ago
Rule-based static analysis of network protocol implementations
Today's software systems communicate over the Internet using standard protocols that have been heavily scrutinized, providing some assurance of resistance to malicious attack...
Octavian Udrea, Cristian Lumezanu, Jeffrey S. Fost...
CSDA
2006
84views more  CSDA 2006»
13 years 9 months ago
Extremal financial risk models and portfolio evaluation
It is difficult to find an existing single model which is able to simultaneously model exceedances over thresholds in multivariate financial time series. A new modeling approach, ...
Zhengjun Zhang, James Huang
JAIR
2008
110views more  JAIR 2008»
13 years 9 months ago
Completeness and Performance Of The APO Algorithm
Asynchronous Partial Overlay (APO) is a search algorithm that uses cooperative mediation to solve Distributed Constraint Satisfaction Problems (DisCSPs). The algorithm partitions ...
Tal Grinshpoun, Amnon Meisels
JCP
2006
110views more  JCP 2006»
13 years 9 months ago
Gateway Selection Review in Ad hoc Networks
The nature of wireless mobile ad hoc networks depend on batteries or other fatiguing means for their energy. A limited energy capacity may be the most significant performance const...
Tarek Sheltami
EAAI
2007
199views more  EAAI 2007»
13 years 9 months ago
Nonlinear system modeling and robust predictive control based on RBF-ARX model
An integrated modeling and robust model predictive control (MPC) approach is proposed for a class of nonlinear systems with unknown steady state. First, the nonlinear system is id...
Hui Peng, Zi-Jiang Yang, Weihua Gui, Min Wu, Hideo...